„threshold cryptography“
Suchergebnisse
1.000+ Treffer
-
Will you cross the threshold for me? : generic side-channel assisted chosen-ciphertext attacks on NTRU-based KEMs
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems LII
-
Decentralizing Software Identity Management
-
Cloud security mechanisms
-
Advances in Brain Inspired Cognitive Systems – 6th International Conference, BICS 2013, Beijing, China, June 9-11, 2013. Proceedings
-
Weight Reduction in Distributed Protocols: New Algorithms and Analysis
-
Blockchain Governance via Sharp Anonymous Multisignatures
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIII – Special Issue on Database- and Expert-Systems Applications
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI – Special Issue on Data and Security Engineering
-
Generic construction of threshold ring signatures and lattice-based instantiations
-
Pollard's rho attack on ECDLP and Threshold Schemes
-
A verifiable variable threshold visual image secret sharing scheme
-
Algebra for Applications – Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression
-
Round-Optimal Lattice-Based Threshold Signatures, Revisited
-
Linear Threshold Secret-Sharing with Binary Reconstruction
-
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
-
Algebra for Applications – Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLI – Special Issue on Data and Security Engineering
-
Transactions on Large-Scale Data- and Knowledge-Centered Systems I